Check: IDMS-DB-000800
CA IDMS STIG:
IDMS-DB-000800
(in versions v1 r2 through v1 r1)
Title
CA IDMS must prevent user code from issuing selected SVC privileged functions. (Cat II impact)
Discussion
If an SVC is used to facilitate interpartition communication for online applications executing under other DC systems, batch application programs, and programs executed under TP monitors other than DC when running on the same LPAR, privileged functions of the SVC can be protected from these entities that do not run within the IDMS DC partition with a combination of the key specification and the disabling of selected SVC functions.
Check Content
Log on to IDMS DC system. Issue DCMT D MEM SVC+6D0 to get address of SVC options (svcopt-addr). Issue DCMT D MEM svcopt-addr. With all lengths of 1, at offset 1 is the SVC number, offset 3 contains CVKEY number, offset x' D' contains a flag byte where a setting of X'20' indicates AUTHREQ=YES. If there is no valid number for CVKEY and the flag byte of X'20' is not set, this is a finding. Note: Offsets are subject to change.
Fix Text
Set #SVCOPT parameters CVKEY to the chosen key for startup modules and AUTHREQ=YES to create a secured SVC. Assemble, relink and install SVC. Create an entry in the Z/OS PPT for the startup module in the chosen key. All IDMS CV startup modules must reside in an authorized library and must be linked as authorized (SETCODE AC(1)). The IBM Z/OS parameter AllowUserKeyCsa should also be checked since the setting may impact the CVKEY choice (see TEC574934 for details).
Additional Identifiers
Rule ID: SV-251644r855282_rule
Vulnerability ID: V-251644
Group Title: SRG-APP-000431-DB-000388
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-002530 |
The information system maintains a separate execution domain for each executing process. |
Controls
Number | Title |
---|---|
SC-39 |
Process Isolation |